sign.go 1.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142
  1. // Copyright (c) Tailscale Inc & AUTHORS
  2. // SPDX-License-Identifier: BSD-3-Clause
  3. package controlclient
  4. import (
  5. "crypto"
  6. "errors"
  7. "fmt"
  8. "time"
  9. "tailscale.com/tailcfg"
  10. "tailscale.com/types/key"
  11. )
  12. var (
  13. errNoCertStore = errors.New("no certificate store")
  14. errCertificateNotConfigured = errors.New("no certificate subject configured")
  15. errUnsupportedSignatureVersion = errors.New("unsupported signature version")
  16. )
  17. // HashRegisterRequest generates the hash required sign or verify a
  18. // tailcfg.RegisterRequest.
  19. func HashRegisterRequest(
  20. version tailcfg.SignatureType, ts time.Time, serverURL string, deviceCert []byte,
  21. serverPubKey, machinePubKey key.MachinePublic) ([]byte, error) {
  22. h := crypto.SHA256.New()
  23. // hash.Hash.Write never returns an error, so we don't check for one here.
  24. switch version {
  25. case tailcfg.SignatureV1:
  26. fmt.Fprintf(h, "%s%s%s%s%s",
  27. ts.UTC().Format(time.RFC3339), serverURL, deviceCert, serverPubKey.ShortString(), machinePubKey.ShortString())
  28. case tailcfg.SignatureV2:
  29. fmt.Fprintf(h, "%s%s%s%s%s",
  30. ts.UTC().Format(time.RFC3339), serverURL, deviceCert, serverPubKey, machinePubKey)
  31. default:
  32. return nil, errUnsupportedSignatureVersion
  33. }
  34. return h.Sum(nil), nil
  35. }